One of the findings of risk assessment is that many of the servers on the data center subnet contain data that is in scope for PCI compliance, Everyone in the company has access to these servers, regardless of their job function. Which of the following should the administrator do?

A. Segment the network
B. Use 802.1X
C. Deploy a proxy sever
D. Configure ACLs
E. Write an acceptable use policy


Answer: A. Segment the network

Computer Science & Information Technology

You might also like to view...

In addition to ensuring adequate awareness of future risk, the risk management process also makes certain that a commonly accepted and systematic set of policies and procedures is in place to handle existing risks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The contents of ________ memory are erased when the computer is turned off

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a business letter, the ____________________, which consists of the month, day, and year, is positioned two to six lines below the letterhead.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Typically data in a database is organized into fields, records, and files.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology